You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Home Front: Politix
Report: Insider Stole DNC Data Five Days Before Seth Rich Murder…No Russian Hacker!
2017-07-11
[BigLeaguePolitics]
Posted by:JohnQC

#3  This is likely a better and less 'dramatic' source.
Posted by: Pappy   2017-07-11 11:32  

#2  JohnQC, I can't access your link from my work site (NSFW), but the information in the original post makes a LOT of sense.

A computer (the server or a workstation on the local, on-site network) was rebooted, probably under pretext of applying patches, but booted to a Linux installation on a large capacity USB drive. Linux has this capability to allow people to "try out" a specific flavor of Linux without installing it on a hard drive, and thus not lose their Windows installation. This reboot bypasses the Windows workstation/server protection software intended to monitor, record, and block activities *just like this*, for later auditing. The installation was a stand-alone boot, which allowed the drive to be overwritten with the data being copied. The command used to copy the files updates the time-stamp with the current time. The time difference between the youngest and oldest copied files, divided into the total size of all the files copied, gives a rough speed at which the files were written.

The copy speed was 23mb per second: way too high for this to have been done over the internet, which is how a *Russian* hacker could have moved the data off the server after they hacked into it. However, the speed is consistent with a copy to a USB drive inserted into the server. It could have been done using a workstation provided it was a typical 100Megabit or top-of-the-line 1 Gigabit network, and done at a time when it would be very lightly loaded (i.e. at the dead of night, with nobody else around on the network.)

Yeah, it was an inside job.

I cannot address, however, the validity of the accusation that the Guccifer 2.0 "hacking" of these data files was actually a false-flag operation conducted by the DNC to discredit the Wikileaks released. However, I know that a lot of IT security organizations would know how to do it, who also would have been in the tank for the Democrats (especially if well compensated).

Posted by: ptah   2017-07-11 11:11  

#1   A little more detail.

Does this make sense IT types?
Posted by: JohnQC   2017-07-11 09:06  

00:00